Analysis
-
max time kernel
149s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22-09-2024 13:43
Static task
static1
Behavioral task
behavioral1
Sample
f223301d7067bd92990ff21ca936eb21_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
f223301d7067bd92990ff21ca936eb21_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f223301d7067bd92990ff21ca936eb21_JaffaCakes118.exe
-
Size
417KB
-
MD5
f223301d7067bd92990ff21ca936eb21
-
SHA1
fb090a6b9d9e93838a19c9fa4f916394a46aa681
-
SHA256
44d7a61d3747767e1b03f7d01b3dd97fd13b1b22f38fc2ce2f71411cff58b305
-
SHA512
19d6ba4568c765059be128fef0989449263c6ae5c4ecb81549b0083138b933092bd1a7b5ab806beac388fc00a6ba1dfc0fe0c53992467639aed7299b2d3092dc
-
SSDEEP
6144:FcxUSabTOKo4YvoJBJc0MOPz+ZYQQbiJYEJ1Cv9N:Sx0AoxcJazYYfiWBv9N
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation f223301d7067bd92990ff21ca936eb21_JaffaCakes118.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.exe.lnk f223301d7067bd92990ff21ca936eb21_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 4808 tmp.exe -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File created C:\Windows\assembly\Desktop.ini f223301d7067bd92990ff21ca936eb21_JaffaCakes118.exe File opened for modification C:\Windows\assembly\Desktop.ini f223301d7067bd92990ff21ca936eb21_JaffaCakes118.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\assembly f223301d7067bd92990ff21ca936eb21_JaffaCakes118.exe File created C:\Windows\assembly\Desktop.ini f223301d7067bd92990ff21ca936eb21_JaffaCakes118.exe File opened for modification C:\Windows\assembly\Desktop.ini f223301d7067bd92990ff21ca936eb21_JaffaCakes118.exe -
Subvert Trust Controls: Mark-of-the-Web Bypass 1 TTPs 1 IoCs
When files are downloaded from the Internet, they are tagged with a hidden NTFS Alternate Data Stream (ADS) named Zone.Identifier with a specific value known as the MOTW.
description ioc Process File created C:\Users\Admin\AppData\Roaming\FolderN\name.exe:Zone.Identifier cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f223301d7067bd92990ff21ca936eb21_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 4680 timeout.exe -
NTFS ADS 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\FolderN\name.exe:Zone.Identifier cmd.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4248 f223301d7067bd92990ff21ca936eb21_JaffaCakes118.exe 4248 f223301d7067bd92990ff21ca936eb21_JaffaCakes118.exe 4248 f223301d7067bd92990ff21ca936eb21_JaffaCakes118.exe 4248 f223301d7067bd92990ff21ca936eb21_JaffaCakes118.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4248 f223301d7067bd92990ff21ca936eb21_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4248 f223301d7067bd92990ff21ca936eb21_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4248 wrote to memory of 2032 4248 f223301d7067bd92990ff21ca936eb21_JaffaCakes118.exe 90 PID 4248 wrote to memory of 2032 4248 f223301d7067bd92990ff21ca936eb21_JaffaCakes118.exe 90 PID 4248 wrote to memory of 2032 4248 f223301d7067bd92990ff21ca936eb21_JaffaCakes118.exe 90 PID 2032 wrote to memory of 1932 2032 cmd.exe 92 PID 2032 wrote to memory of 1932 2032 cmd.exe 92 PID 2032 wrote to memory of 1932 2032 cmd.exe 92 PID 4248 wrote to memory of 4808 4248 f223301d7067bd92990ff21ca936eb21_JaffaCakes118.exe 93 PID 4248 wrote to memory of 4808 4248 f223301d7067bd92990ff21ca936eb21_JaffaCakes118.exe 93 PID 4248 wrote to memory of 4808 4248 f223301d7067bd92990ff21ca936eb21_JaffaCakes118.exe 93 PID 4248 wrote to memory of 3816 4248 f223301d7067bd92990ff21ca936eb21_JaffaCakes118.exe 94 PID 4248 wrote to memory of 3816 4248 f223301d7067bd92990ff21ca936eb21_JaffaCakes118.exe 94 PID 4248 wrote to memory of 3816 4248 f223301d7067bd92990ff21ca936eb21_JaffaCakes118.exe 94 PID 3816 wrote to memory of 4680 3816 cmd.exe 96 PID 3816 wrote to memory of 4680 3816 cmd.exe 96 PID 3816 wrote to memory of 4680 3816 cmd.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\f223301d7067bd92990ff21ca936eb21_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f223301d7067bd92990ff21ca936eb21_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops startup file
- Drops desktop.ini file(s)
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4248 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe"2⤵
- Subvert Trust Controls: Mark-of-the-Web Bypass
- System Location Discovery: System Language Discovery
- NTFS ADS
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows" /v Load /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\FolderN\name.exe.lnk" /f3⤵
- System Location Discovery: System Language Discovery
PID:1932
-
-
-
C:\Users\Admin\AppData\Roaming\tmp.exe"C:\Users\Admin\AppData\Roaming\tmp.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4808
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\FolderN\name.exe.bat2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3816 -
C:\Windows\SysWOW64\timeout.exetimeout /t 3003⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:4680
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
189B
MD5dca86f6bec779bba1b58d992319e88db
SHA1844e656d3603d15ae56f36298f8031ad52935829
SHA256413b4ee68f5400fcd30ae5df957d723989b400637dbc7f5d158fa050bdc20743
SHA5124b9d532a777921543b3243020ea4b655a8b956c400b237ce714b5bd8e9a3ad7fdbcb11410e84e2e0ecc45e87dcd107385a487f5bb5b359aabd1322314ef2d24c
-
Filesize
124KB
MD5bfa2fdc1bbcf4d0de7190f6299c9df76
SHA18c813c968518063e020a1b547c5c1d23636fddbb
SHA25677ab5139107570f1177eedaf9f6842af0811b7754cc1d5a589791f9c7a7ef961
SHA512faa2380ad25f20aa14e0b656865f546a9b48a11491b08e02a5c5415f6ced6bf82132c76497dbfb4340571dcbd3ee404a94577adb6c02b8ccc1581329a2034c4f